EP3023904B1 - Création de fichiers implicite dans des scripts APDU - Google Patents

Création de fichiers implicite dans des scripts APDU Download PDF

Info

Publication number
EP3023904B1
EP3023904B1 EP14306865.8A EP14306865A EP3023904B1 EP 3023904 B1 EP3023904 B1 EP 3023904B1 EP 14306865 A EP14306865 A EP 14306865A EP 3023904 B1 EP3023904 B1 EP 3023904B1
Authority
EP
European Patent Office
Prior art keywords
file
script
service
property data
profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP14306865.8A
Other languages
German (de)
English (en)
Other versions
EP3023904A1 (fr
Inventor
Jérôme Dumoulin
Tomasz Wozniak
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Idemia France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to ES14306865T priority Critical patent/ES2857674T3/es
Application filed by Idemia France SAS filed Critical Idemia France SAS
Priority to EP14306865.8A priority patent/EP3023904B1/fr
Priority to KR1020177017057A priority patent/KR102487943B1/ko
Priority to JP2017527710A priority patent/JP6751088B2/ja
Priority to US15/528,658 priority patent/US10901716B2/en
Priority to PCT/EP2015/077309 priority patent/WO2016083282A1/fr
Publication of EP3023904A1 publication Critical patent/EP3023904A1/fr
Priority to JP2020086994A priority patent/JP2020144911A/ja
Application granted granted Critical
Publication of EP3023904B1 publication Critical patent/EP3023904B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/308Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning

Definitions

  • M2M machine-to-machine
  • eUICC embedded Universal Integrated Circuit Card
  • SIM Subscriber Identity Module
  • the eUICC is not so easy to remove as it is embedded in the device, being soldered, for example, onto a circuit board of the device.
  • a profile is created when a remote management application on the card executes the commands in a "provisioning script".
  • An eUICC may store multiple profiles, such as a profile per type of access network (GSM, CDMA). Also, a profile may be updated or a new profile downloaded when an owner of the wireless device wants to use a different access network operator to provide the access network for that wireless device.
  • the method can be performed to create or generate a script for sending to a secure element, such as creating a script from a specification file.
  • the method can be performed to process or "filter" an existing script. By processing the existing script, the method can reduce the length of the script.
  • the first entry may comprise a create file command, a file identifier and file properties and the second entry may comprise the file identifier.
  • the second entry does not need to specify all, or any, of the file properties.
  • Another aspect of the invention provides a method of provisioning a profile at a secure element comprising:
  • the entry in the script may comprises a file identifier and the method comprises: using the file identifier to locate file property data in the local store; and creating the file with the identifier and the file property data.
  • the entry in the script may comprise a select file command and a file identifier and the file created in advance of execution of the script may comprise the same file identifier.
  • the method may further comprise receiving a service table indicating at least one service required by the profile, and wherein the local store of file property data includes an indication of a service that the file property data is associated with, and the method comprises:
  • the file property data may comprise at least one of: a file identifier; file size, file access rights.
  • the file property data may be stored in a single data structure which stores file property data for mandatory files and optional files.
  • An advantage of at least one embodiment is that the size of the script can be reduced.
  • An advantage of at least one embodiment is that the size of the script can be reduced while maintaining conformity with existing commands used over an interface to the device. For example, the script can still conform to ISO 7816 because it still uses ISO 7816 APDU commands.
  • FIG. 1 shows an architecture for provisioning and management of an embedded Universal Integrated Circuit Card (eUICC) 30 hosted by a wireless device 20.
  • the wireless device 20 are a machine-to-machine (M2M) device and a mobile device, such as a smart phone, mobile phone, dongle or other wireless device which can communicate via a wireless network.
  • Device 20 uses at least one wireless access network, such as a 2G, 3G or 4G network.
  • the eUICC 30 is a self-contained computer on a chip with a processor and storage.
  • the eUICC 30 provides a secure environment in which to perform certain tasks, such as establishing secure communication with the access network.
  • the eUICC 30 can be remotely provisioned with a profile.
  • the profile provides the device with functionality to access a specific mobile network infrastructure.
  • the profile can comprise a file structure, data and applications.
  • Network entities participating in the provisioning process include a Subscription Manager Data Preparation (SM-DP) entity 10 and a Subscription Manager Secure Routing (SM-SR) entity 12.
  • the SM-DP 10 prepares the profiles and manages the secure download and installation of the profiles on the eUICC 30.
  • the SM-SR 12 securely performs functions of platform management commands and the transport of profile management commands.
  • a communication network 15 is used to access the device 30 for provisioning purposes.
  • An eUICC may store multiple profiles 31.
  • the eUICC 30 can also store a File Properties (FP) table 50. As described in more detail later, the File Properties table 50 is used when provisioning a profile.
  • the File Properties table 50 can be used as shared resource by the eUICC when provisioning one or more profiles 31.
  • FP File
  • the store of file property data 50 can be transferred to the eUICC 30 during manufacture of the eUICC, or during pre-issuance of the eUICC or host device 20 into which the eUICC is embedded.
  • Figure 3 shows a short extract of an example of a conventional script 40.
  • the conventional script 40 includes entries 41, 42, 43 which instruct the eUICC to create a file.
  • the entries comprise a "CREATE FILE" command, an identifier of the file to be created, and properties/parameters for the file creation.
  • Files are created with a fixed length and are initialised with the fill pattern.
  • the fill pattern is a pattern of data which initially populates the newly created file.
  • the script 45 may include at least one file creation command. For example, it may be necessary to create a proprietary file whose existence cannot be deduced either from the standards or from the service table, and which it is still necessary to explicitly define in the script sent to the eUICC.
  • properties of mandatory files and optional files are stored together in one data structure FP.
  • Entries in the data structure have a service# field.
  • a mandatory file can be indicated by any other suitable value of service#, such as a negative value (e.g. -1) or any positive value outside the expected range (1...n) used in the service table.
  • An alternative to storing file properties in a single data structure is to store a data structure for mandatory files and to store a separate data structure for optional files.
  • the processor 31 may be a microcontroller, microprocessor or any other suitable type of processor for executing instructions.
  • Processor-executable instructions 37 can be stored in ROM 32 and/or Flash memory 34.
  • the processor-executable instructions 37 can include a management application for remotely providing a profile.
  • An interface 35 supports communication between the device 30 and the host device 20.
  • Memory 34, or ROM 32, can store file property data 50 which is used to locally create files at the secure element.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Claims (7)

  1. Procédé de préparation d'un script de commandes APDU ISO 7816 à envoyer à un élément sécurisé (30) pour fournir à distance un profil (31) à l'élément sécurisé (30), dans lequel :
    l'élément sécurisé (30) dispose d'un stockage local de données de propriété de fichier (50) correspondant à des paramètres pour une commande de création de fichier,
    le procédé comprenant les étapes consistant à :
    recevoir (121) un premier script qui comprend une commande de création de fichier ;
    déterminer (122) si la commande de création de fichier correspond à un fichier dont les propriétés de fichier sont stockées dans le stockage local de données de propriété de fichier au niveau de l'élément sécurisé ;
    si la commande de création de fichier correspond au fichier dont les propriétés de fichier sont stockées, remplacer (123) la commande de création de fichier par une commande de sélection de fichier pour générer un script modifié ; et
    délivrer (124) le script modifié.
  2. Procédé de mise à disposition d'un profil au niveau d'un élément sécurisé (30) comprenant les étapes consistant à :
    recevoir (101) un script de commandes APDU ISO 7816 pour fournir le profil ;
    recevoir un tableau de services indiquant au moins un service requis par le profil, et dans lequel le stockage local de données de propriété de fichier comporte une indication d'un service auquel sont associées les données de propriété de fichier ;
    exécuter (102), par une application de gestion, le script pour fournir le profil,
    dans lequel l'exécution par l'application de gestion comprend :
    la lecture (103) d'une commande de sélection de fichier dans le script ;
    la détermination (104) quant à savoir si le fichier existe ; et, si le fichier n'existe pas, la création (105) du fichier en utilisant un stockage local de données de propriété de fichier correspondant à des paramètres pour une commande de création de fichier au niveau de l'élément sécurisé ;
    dans lequel le procédé comprend en outre les étapes consistant à :
    utiliser le tableau de services pour identifier les services requis pour le profil ;
    récupérer des données de propriété de fichier à partir du stockage local de données de propriété de fichier pour chaque service requis ; et
    créer au moins un fichier pour le service requis en utilisant les données de propriété de fichier récupérées.
  3. Procédé selon la revendication 2 dans lequel la commande de sélection de fichier dans le script comprend un identifiant de fichier, et le procédé comprend les étapes consistant à :
    utiliser l'identifiant de fichier pour localiser des données de propriété de fichier dans le stockage local ; et
    créer le fichier avec l'identifiant et les données de propriété de fichier.
  4. Procédé selon l'une quelconque des revendications précédentes dans lequel les données de propriété de fichier comprennent au moins l'un parmi : un identifiant de fichier ; une taille de fichier, des droits d'accès au fichier.
  5. Procédé selon l'une quelconque des revendications 1 à 4, dans lequel l'élément sécurisé est une carte à circuit intégré universelle intégrée.
  6. Élément sécurisé comprenant un processeur et une mémoire, la mémoire contenant des instructions exécutables par le processeur, le processeur étant configuré pour effectuer le procédé selon l'une quelconque des revendications 2 à 4.
  7. Élément sécurisé selon la revendication 6, dans lequel l'élément sécurisé est une carte à circuit intégré universelle intégrée.
EP14306865.8A 2014-11-24 2014-11-24 Création de fichiers implicite dans des scripts APDU Active EP3023904B1 (fr)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP14306865.8A EP3023904B1 (fr) 2014-11-24 2014-11-24 Création de fichiers implicite dans des scripts APDU
ES14306865T ES2857674T3 (es) 2014-11-24 2014-11-24 Creación de archivos implícita en secuencias de comandos APDU
JP2017527710A JP6751088B2 (ja) 2014-11-24 2015-11-23 Apduスクリプトにおける黙示的ファイル生成
US15/528,658 US10901716B2 (en) 2014-11-24 2015-11-23 Implicit file creation in APDU scripts
KR1020177017057A KR102487943B1 (ko) 2014-11-24 2015-11-23 Apdu 스크립트들에서의 암시적 파일 작성
PCT/EP2015/077309 WO2016083282A1 (fr) 2014-11-24 2015-11-23 Création de fichier implicite dans des scripts apdu
JP2020086994A JP2020144911A (ja) 2014-11-24 2020-05-18 Apduスクリプトにおける黙示的ファイル生成

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP14306865.8A EP3023904B1 (fr) 2014-11-24 2014-11-24 Création de fichiers implicite dans des scripts APDU

Publications (2)

Publication Number Publication Date
EP3023904A1 EP3023904A1 (fr) 2016-05-25
EP3023904B1 true EP3023904B1 (fr) 2021-01-27

Family

ID=52101239

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14306865.8A Active EP3023904B1 (fr) 2014-11-24 2014-11-24 Création de fichiers implicite dans des scripts APDU

Country Status (6)

Country Link
US (1) US10901716B2 (fr)
EP (1) EP3023904B1 (fr)
JP (2) JP6751088B2 (fr)
KR (1) KR102487943B1 (fr)
ES (1) ES2857674T3 (fr)
WO (1) WO2016083282A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556323B (zh) 2016-02-06 2022-05-13 华为技术有限公司 图像编解码方法及装置
US10285045B2 (en) * 2017-09-05 2019-05-07 T-Mobile Usa, Inc. Monitoring of embedded subscriber identity modules
CN107659715B (zh) * 2017-09-18 2021-01-08 惠州Tcl移动通信有限公司 一种固定拨号设置方法、存储介质及移动终端
FR3078469B1 (fr) * 2018-02-26 2020-03-06 Idemia France Configuration d'un module d'identite de souscripteur embarque
CN110895465A (zh) * 2018-10-31 2020-03-20 研祥智能科技股份有限公司 数字电源芯片烧录方法
CN109902493B (zh) * 2019-01-04 2023-12-22 平安科技(深圳)有限公司 脚本的下发方法及服务器
JP7423966B2 (ja) 2019-10-02 2024-01-30 大日本印刷株式会社 電子情報記憶媒体、プログラム、及びプロファイル更新状態通知方法
TWI787035B (zh) * 2022-01-04 2022-12-11 緯創資通股份有限公司 網路服務存取方法及其相關行動終端裝置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6402028B1 (en) * 1999-04-06 2002-06-11 Visa International Service Association Integrated production of smart cards
US7162631B2 (en) * 2001-11-02 2007-01-09 Activcard Method and system for scripting commands and data for use by a personal security device
EP1605415A1 (fr) * 2004-06-11 2005-12-14 Axalto SA Système de gestion de fichiers
JP2007018254A (ja) * 2005-07-07 2007-01-25 Toshiba Corp 言語処理装置
JP4836707B2 (ja) * 2006-08-21 2011-12-14 株式会社東芝 携帯可能電子装置およびicカード
JP2008269052A (ja) * 2007-04-17 2008-11-06 Nec Electronics Corp 演算処理回路、半導体集積回路、及びプログラムの変換方法
FR2966946B1 (fr) 2010-10-27 2012-11-30 Oberthur Technologies Procede de configuration d'une entite electronique
JP5518792B2 (ja) * 2011-06-13 2014-06-11 日本電信電話株式会社 Icカードシステム、icカードシステムのリカバリ方法およびサーバ
EP2802162A1 (fr) * 2013-05-07 2014-11-12 Gemalto SA Procédé permettant d'accéder à un service, dispositif et système correspondants
US10140615B2 (en) * 2014-09-22 2018-11-27 Visa International Service Association Secure mobile device credential provisioning using risk decision non-overrides

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "ISO/IEC 7816 - Wikipedia", 18 May 2014 (2014-05-18), XP055358490, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=ISO/IEC_7816&oldid=609071318> [retrieved on 20170324] *

Also Published As

Publication number Publication date
US10901716B2 (en) 2021-01-26
KR102487943B1 (ko) 2023-01-11
JP6751088B2 (ja) 2020-09-02
JP2018506761A (ja) 2018-03-08
JP2020144911A (ja) 2020-09-10
WO2016083282A1 (fr) 2016-06-02
ES2857674T3 (es) 2021-09-29
KR20170087488A (ko) 2017-07-28
US20170269918A1 (en) 2017-09-21
EP3023904A1 (fr) 2016-05-25

Similar Documents

Publication Publication Date Title
EP3023904B1 (fr) Création de fichiers implicite dans des scripts APDU
US10206097B2 (en) Apparatuses, methods and systems for configuring a trusted java card virtual machine using biometric information
JP6622394B2 (ja) 複数のアクティブな加入者識別モジュールプロファイルの管理
EP3267699B1 (fr) Procédé permettant d&#39;effectuer une gestion à distance d&#39;un module sim de multi-subscription et module sim correspondant et produit programme informatique
EP2735180B1 (fr) Sélection d&#39;application pour environnement à multiples cartes sim
US10833715B2 (en) Embedded subscriber identity module including communication profiles
EP2887702B1 (fr) Procédé et dispositif pour fournir un élément sécurisé avec un profil d&#39;abonnement
US11064343B2 (en) Management of subscriber profiles simultaneously active in an eUICC card using a plurality of separate links
US11172352B2 (en) Apparatuses, methods, and systems for configuring a trusted java card virtual machine using biometric information
EP3087767B1 (fr) Procédé permettant d&#39;accéder à un service, dispositif et système correspondants
EP3171566A1 (fr) Procédé, dispositif et système de gestion de domaine de sécurité
US11805397B2 (en) IMEI binding and dynamic IMEI provisioning for wireless devices
EP2727384B1 (fr) Procédé d&#39;accès à au moins un service et système correspondant
EP2819078A1 (fr) Procédé, dispositif et système d&#39;accès à un service sans contact
EP3024254A1 (fr) Reconfiguration automatique de carte SIM en situation d&#39;itinérance
CN111526508A (zh) 在集成电路卡中共享移动运营商配置文件的方法、系统及产品
EP2799982B1 (fr) Applications de carte à puce intelligente de rendu de texte numérique sur un équipement mobile
US20170228556A1 (en) Method of managing several profiles in a secure element
KR102271597B1 (ko) 통신망 기반 원격 단말 관리를 위한 서버 및 방법
CN115209382A (zh) 用于多个eSIM配置文件的逻辑信道管理
EP2890165A1 (fr) Procédé permettant d&#39;accéder à un service, dispositifs et système correspondants
EP2890164A1 (fr) Procédé permettant d&#39;accéder à un service, dispositif et système correspondants

Legal Events

Date Code Title Description
AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20161026

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20170329

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: IDEMIA FRANCE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602014074535

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G06F0021720000

Ipc: H04W0012040000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: G06Q 20/34 20120101ALI20200908BHEP

Ipc: G06F 16/16 20190101ALI20200908BHEP

Ipc: H04W 12/00 20090101ALI20200908BHEP

Ipc: G07F 7/10 20060101ALI20200908BHEP

Ipc: G06F 21/72 20130101ALI20200908BHEP

Ipc: H04W 12/04 20090101AFI20200908BHEP

INTG Intention to grant announced

Effective date: 20200923

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: IDEMIA FRANCE

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1359419

Country of ref document: AT

Kind code of ref document: T

Effective date: 20210215

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602014074535

Country of ref document: DE

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20210127

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210427

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210427

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210428

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210527

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2857674

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20210929

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210527

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602014074535

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

REG Reference to a national code

Ref country code: AT

Ref legal event code: UEP

Ref document number: 1359419

Country of ref document: AT

Kind code of ref document: T

Effective date: 20210127

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20211028

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210527

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211124

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211130

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20211130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211130

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20141124

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230428

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231019

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231201

Year of fee payment: 10

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20231020

Year of fee payment: 10

Ref country code: IT

Payment date: 20231019

Year of fee payment: 10

Ref country code: IE

Payment date: 20231023

Year of fee payment: 10

Ref country code: FR

Payment date: 20231019

Year of fee payment: 10

Ref country code: DE

Payment date: 20231019

Year of fee payment: 10

Ref country code: AT

Payment date: 20231023

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20210127